sks-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Sks-devel] dealing with misplaced signatures


From: Daniel Kahn Gillmor
Subject: Re: [Sks-devel] dealing with misplaced signatures
Date: Tue, 31 Jul 2012 18:53:54 -0400
User-agent: Mozilla/5.0 (X11; Linux i686; rv:10.0.5) Gecko/20120624 Icedove/10.0.5

On 07/31/2012 06:04 PM, Kristian Fiskerstrand wrote:
> Currently we have a patch[0] ready that allows for these signatures to
> be cleaned in the getting (and vindex) of the key, 

A patch with the stated functionality would be a Good Thing.

> However, before creating a Pull Request into the SKS Trunk, we have to
> verify that this solution would not actually violating RFC4880. 

If anything, the current sks implementation is violating RFC 4880, which
clearly states that transferable public key certificates contain:

     - After each Subkey packet, one Signature packet, plus optionally a
       revocation

SKS seems willing to record and produce more than one signature packet
in this position.  The "one signature packet" is unambiguously intended
to refer to a subkey binding signature, fwiw, not any of the other
signature types.

Note that i think it's probably reasonable for sks to store more than
one subkey binding signature packet per subkey (to accomodate subkey
expiration revisions, particularly since sks has no cryptographic
verification in place, so it can't tell a valid subkey expiration
revision from an invalid one); i'm not arguing for blind adherence to
the spec, i'm arguing for practical utility here.

> Although
> there are implications that 0x10-0x13 signatures are for UID/UAT
> packages, and as such would not belong to a subkey, would starting to
> "hide information" be a violation of SKS's neutral way of storing data,

sks should not be so neutral as to store incomprehensible data (we
reject malformed packets, for example), and no one has stepped forward
with any explanation of why an identity certification signature could
make sense following a subkey.

Pursuing the patch to sks will fix one part of the problem here; gpg
probably also needs fixing to drop these bogus packets, or at least to
reassign them to their correct spot in the certificate if such a spot
can be found.  Note also that the same signature packet might be
duplicated; if it fits in one place in the keyring, and a byte-for-byte
identical signature packet is found elsewhere, in a place where it is
not cryptographically valid, that latter copy of the packet can probably
be safely discarded.

my $0.02,

        --dkg

Attachment: signature.asc
Description: OpenPGP digital signature


reply via email to

[Prev in Thread] Current Thread [Next in Thread]